Sep 12, 2009

A Huge List Of Ebook Sites

Free ebook websites have been around for a long time and dominate almost every niche imaginable.But then what about those ebooks which are costly and common people would not like to but them for thousands of dollars.So i thought of giving u guys a huge list of sites from where you can download ebooks for free.



O'Reilly online h**p://www.oreilly.com/openbook/ | h**p://sysadmin.oreilly.com/
Computer books and manuals
h**p://www.hoganbooks.com/freebook/webbooks.html |
h**p://www.informit.com/itlibrary/ |
h**p://www.fore.com/support/manuals/home/home.htm |
h**p://www.adobe.com/products/acrobat/webbuy/freebooks.html
The Network Book h**p://www.cs.columbia.edu/netbook/
Some #bookwarez.efnet.irc links
h**p://www.extrema.net/books/links.shtml
Some #bookwarez.efnet.irc fiction
h**p://194.58.154.90:4431/enscifi/
Pimpas online books (Indonesia)

h**p://202.159.16.55/~pimpa2000 | h**p://202.159.15.46/~om-pimpa/buku
Security, privacy and cryptography
h**p://theory.lcs.mit.edu/~rivest/crypto-security.html |
h**p://www.oberlin.edu/~brchkind/cyphernomicon/
My own misc online reading material
h**p://www.eastcoastfx.com/docs/admin-guides/ |
h**p://www.eastcoastfx.com/~jorn/reading/
Computer books h**p://solaris.inorg.chem.msu.ru/cs-books/
| h**p://sweetrude.net/~cab/books/ | h**p://alaska.mine.nu/books/ |
h**p://poprocks.dyn.ns.ca/dave/books/ | h**p://58-160.skarland.uaf.edu/books/ |
h**p://202.186.247.194/~ebook/
| h**p://hooligans.org/reference/
Linux documentation h**p://www.linuxdoc.org/docs.html
FreeBSD documentation h**p://www.freebsd.org/tutorials/
Sun documentation h**p://osiris.imw.tu-clausthal.de:8888/ |
h**p://uran.vvsu.ru:8888/
SGI documentation
h**p://newton.unicc.chalmers.se/ebt-bin/nph-dweb/dynaweb;td=2 |
h**p://techpubs.sgi.com/library/tpl/cgi-bin/init.cgi
IBM Online Redbooks h**p://www.redbooks.ibm.com/
Digital Unix documentation
h**p://www.unix.digital.com/faqs/publications/base_doc/DOCUMENTATION/V40D_HTML/V
40D_HTML/LIBRARY.HTM
Filesystem Hierarchy Standard
h**p://www.pathname.com/fhs/2.0/fhs-toc.html | h**p://www.linuxbase.com/
UNIX stuff h**p://www.ucs.ed.ac.uk/~unixhelp/index.html |
h**p://www.uwsg.indiana.edu/usail/ |
h**p://www.isu.edu/departments/comcom/unix/workshop/unixindex.html |
h**p://www.franken.de/users/lorien/unix.html |
h**p://www.cs.buffalo.edu/~milun/unix.programming.html
Programmers reading h**p://www.programmersheaven.com/ |
h**p://www.cs.monash.edu.au/~alanf/se_proj97/
Programming Pearls 2nd edition
h**p://www.cs.bell-labs.com/cm/cs/pearls/
C stuff
h**p://www.strath.ac.uk/CC/Courses/NewCcourse/ccourse.html |
h**p://www.cm.cf.ac.uk/Dave/C/CE.html |
h**p://www.cprogramming.com/tutorial.html |
h**p://www.cs.virginia.edu/c++programdesign/slides/ |
h**p://www.icce.rug.nl/docs/cplusplus/cplusplus.html
Perl stuff h**p://www.webdesigns1.com/perl/ir.html |
h**p://www.ictp.trieste.it/texi/perl/perl_toc.html |
h**p://www.itknowledge.com/tpj/ | h**p://www.plover.com/~mjd/perl/
Java stuff h**p://www.cs.brown.edu/courses/cs016/book/ |
h**p://polaris.cis.ksu.edu/~schmidt/CIS200/ |
h**p://www.daimi.au.dk/dProg1/java/langspec-1.0/index.html
Lisp stuff
h**p://www.cs.cmu.edu/afs/cs.cmu.edu/project/airepository/
ai/html/cltl/mirrors.html
| h**p://www.cs.tulane.edu/www/Villamil/lisp/
Ada stuff h**p://www.adahome.com/Tutorials/
Database reading
h**p://www.bus.orst.edu/faculty/brownc/lectures/db_tutor/index.htm
SQL stuff h**p://w3.one.net/~jhoffman/sqltut.htm |
h**p://www.doc.mmu.ac.uk/STAFF/E.Ferneley/SQL/index.htm |
h**p://www.daimi.au.dk/~oracle/sql/index.html
Visual Basic stuff h**p://www.vb-world.net/books/
Handbook of Applied Cryptography
h**p://www.cacr.math.uwaterloo.ca/hac/
X Window System h**p://tronche.com/gui/x/ | h**p://www.cen.com/mw3/refs.html |
h**p://www.gaijin.com/X/
GTK and Gnome stuff
h**p://developer.gnome.org/doc/GGAD/ggad.html
QT and KDE stuff h**p://www.troll.no/qt/ |
h**p://developer.kde.org/documentation/tutorials/index.html |
h**p://www.arrakis.es/~rlarrosa/tutorial.html
Corba stuff h**p://www.iona.com/hyplan/vinoski/
TCP/IP info h**p://www.tunix.kun.nl/ptr/tcpip.html
Misc programmers reading
h**p://www.cs.wisc.edu/~chilimbi/Pubs.html |
h**p://www.ic.arizona.edu/~nromano/spring99/readings.htm
Some useful tech articles h**p://www.sysadminmag.com/ | h**p://www.dotcomma.org/
Considering Hacking Constructive
h**p://www.firstmonday.dk/issues/issue4_2/gisle/index.html
Eric's Random Writings h**p://www.tuxedo.org/~esr/writings/
IBM's History
h**p://www.ibm.com/ibm/history/story/text.html
Electronic Publishing
h**p://www.civeng.carleton.ca/~nholtz/ElectronicPublishing.html
Digital processing h**p://www.dspguide.com/pdfbook.htm
The Hardware Book h**p://sunsite.auc.dk/hwb/
Network iQ Router Reference Manual
h**p://www.teltrend.co.nz/documentation/networkiq/rel74/html/rmtoc.htm
Cisco Product Documentation
h**p://www.cisco.com/univercd/cc/td/doc/product/
Novell developers appnotes
h**p://developer.novell.com/research/appnotes/
Icons for your desktop h**p://nether.tky.hut.fi/iconstore/
Hackers' Hall of Fame at Discovery Online
h**p://www.discovery.com/area/technology/hackers/hackers.html
Symbols and signs and ideograms and stuff h**p://www.symbols.com/
Dictionaries h**p://www.ohiolink.edu/db/oed.html |
h**p://www.ohiolink.edu/db/ahd.html | h**p://www.ohiolink.edu/db/columbia.html |
h**p://www.ohiolink.edu/db/thes.html | h**p://www.eb.com:180/
Misc reading material h**p://dali.orgland.ru/tcd/ |
h**p://www.ud.se/english/press/pdf_publ.htm
Dantes Inferno
h**p://sophia.smith.edu/~lkleinbe/dante/home.html | h**p://www.divinecomedy.org/
Books and texts h**p://digital.library.upenn.edu/books/ |
h**p://www.cs.cmu.edu/books.html | h**p://www.ipl.org/reading/books/ |
h**p://www.nakedword.org/ | h**p://sunsite.berkeley.edu/alex/
Literature stuff h**p://lion.chadwyck.co.uk:8080/ |
h**p://www.swan.ac.uk/uwp/lit.htm
Octavo books h**p://www.octavo.com/
Project Gutenberg - books and texts h**p://www.promo.net/pg/
Project Runeberg - Scandinavian in books and texts
h**p://www.lysator.liu.se/runeberg/katalog.html
The Elements of Style h**p://www.bartleby.com/141/index.html
Bigtext - illustrated books and manuals for DOS
h**p://www.ozemail.com.au/~kevsol/oldfav.html#bigtext
Breeze - a complete text system for Windows
h**p://www.ozemail.com.au/~kevsol/sware.html#brzwin
Language links h**p://www.june29.com/HLP/
Grimms' fairy tales
h**p://www.nationalgeographic.com/grimm/archive.html
Winnie the Pooh h**p://www.machaon.ru/pooh/
Seven Wonders of the World
h**p://ce.eng.usf.edu/pharos/wonders/
Medieval history h**p://www.fordham.edu/halsall/sbook2.html
Misc history h**p://www.usaor.net/users/ipm/contents.html
| h**p://www.homeusers.prestel.co.uk/littleton/re0_cath.htm
Stonehenges Legends
h**p://www.missgien.net/stonehenge/legends.html
In Parentheses historical papers h**p://www.inpar.dhs.org/
Bulfinchs Mythology h**p://www.bulfinch.org/
The Dead Sea Scrolls
h**p://lcweb.loc.gov/exhibits/scrolls/toc.html
Qumran historical site h**p://www.kalia.org.il/Qumran/
Index of cults h**p://www.totentanz.de/kmedeke/cults.htm
Heretical speculation
h**p://www.calweb.com/~queribus/gnosticgnus.html
The esoteric Ordo Supremus Militaris Templi Hierosolymitani
h**p://www.osmth.org/index.html
Runes and Norse stuff h**p://www.multiart.nu/grimner/ |
h**p://www.eastcoastfx.com/~jorn/runes/
Extinction level events
h**p://members.xoom.com/korwisi/ele/english/index.html |
h**p://impact.arc.nasa.gov/ | h**p://www.boulder.swri.edu/clark/ncar.html
Stephen Hawkings Universe
h**p://www.pbs.org/wnet/hawking/html/home.html
The constellations h**p://www.dibonsmith.com/constel.htm
Falling into a black hole
h**p://casasrv.colorado.edu/~ajsh/schw.shtml
Gravity is a push h**p://www.epicom.com/gravitypush/
Online audiobooks h**p://www.broadcast.com/books/scifi/
ElecBooks h**p://www.elecbook.com/eblist.htm
NewMedia Classics h**p://www.newmediaclassics.com/
Online Books Archive h**p://docs.online.bg/
Internet Public Library h**p://www.ipl.org/
Rocket-Library.com
h**p://www.rocket-library.com/categories.asp
PalmPilot E-Text Ring
h**p://www.webring.org/cgi-bin/webring?ring=pilot_text&id=2&List
Virtual Free Books
h**p://www.virtualfreesites.com/free.books.am.html
All About Ebooks h**p://aalbc.com/ebooks/Allaboutebooks.htm


FTPs
------------------------------------------------------------
\ftp://194.105.193.56/pub/warez/books/os/
\ftp://194.85.35.67/BOOKS/
\ftp://193.231.20.1/pub/books/
\ftp://218.104.214.138/4tF/2003/Xmas/
\ftp://ftp.runnet.ru/BOOKS - (use flashget)
\ftp://se-lab-server.ddns.comp.nus.edu.sg/ebooks/

HTTPs
------------------------------------------------------------
\h**p://sleekfreak.ath.cx:81/books/
\h**p://preterhuman.net/texts/
\h**p://www.waneesoft.net/books/
\h**p://www.itcertifer.com
\h**p://cgdn.net/books/
\h**p://www.nerd-star.com/books/
\h**p://publib-b.boulder.ibm.com/Redbooks.nsf/redbooks/
\h**p://classics.mit.edu/Browse/index-Homer.html
\h**p://www.cybersecurity.com.br/Livros/
\h**p://amitmathur.8m.com/ebooks.html
\h**p://mail.stibanas.ac.id/ebooks/
\h**p://www.wolfgarten.com
\h**p://johnny.ihackstuff.com
\h**p://www.law.fsu.edu
\h**p://mail.stibanas.ac.id/ebooks
\h**p://www.comms.scitech.susx.ac.uk/fft/
\h**p://www.cadforum.cz/cadforum_en/default.asp
\h**p://preterhuman.net/texts/
\h**p://www.eicage.org/eicage.asp
\h**p://bjxebook.myetang.com/pc.html
\h**p://www.about-flash.com/
\h**p://docs.rinet.ru:8080/DEFAULT.HTML
\h**p://www.bsmooth.de/BSolutions/
\h**p://newdata.box.sk/raven/books.html
\h**p://www.maththinking.com/boat/computerbooks.html
\h**p://dhruvaraj.150m.com/
\h**p://podgoretsky.pri.ee/ms.html
\h**p://www.comms.scitech.susx.ac.uk/fft/
\h**p://www.intelinfo.com/free_computer_books.html
\h**p://www.e-book.com.au/freebooks.htm
\h**p://www.mcsedirectory.com/books.shtml
\h**p://www.gorkhali.com/kamal/download.htm
\h**p://www.winnetmag.com/windowsnt20002003faq/
\h**p://www.2000trainers.com/
\h**p://www.w3schools.com/
\h**p://members.rogers.com/thekickman/ebooks.htm
\h**p://www.techtutorials.com/Applications/
\h**p://sunsite.iisc.ernet.in/virlib/
\h**p://www.bdsoft.com/links.html
\h**p://www.python.org/doc/
\h**p://www.graphic-design.com/Photoshop/
\h**p://bjxebook.myetang.com/pc_ebooks/db.htm
\h**p://www.exameware.com
\h**p://www.comms.scitech.susx.ac.uk/fft/
\h**p://rahmat.zikri.com/books.html
\h**p://freebooks.by.ru/
\h**p://www.mindview.net/Books/DownloadSites
\h**p://www.maththinking.com/boat/computerbooks.html
\h**p://docs.rinet.ru:8080/
\h**p://www.ebone.at/files.php?show=Books
\h**p://www.empowermentzone.com/#unix
\h**p://skaiste.elekta.lt/Books/
\h**p://content.443.ch/pub/
\h**p://www.ods.com.ua/index.phtml
\h**p://kavosh.irost.net/books/library.htm
\h**p://stommel.tamu.edu/~baum/programming.html
\h**p://digital.library.upenn.edu/books/
\h**p://zikri.indoglobal.com/books.html
\h**p://www.greylib.align.ru/index.html
\h**p://www.itcertifer.com/en/download/default.asp
\h**p://www.lib.ru
\h**p://lib.km.ru
\h**p://aldebaran.ru
\h**p://lib.bigmir.net
\h**p://books.myweb.ru
\h**p://book.pp.ru
\h**p://www.biglib.com.ua/
\h**p://www.lib.com.ua/
\h**p://www.bestlibrary.ru/
\h**p://www.citforum.ru/
\h**p://i2r.rusfund.ru/
\h**p://www.yaxoo.com/books/
\h**p://docs.gets.ru/
\h**p://bookz.ru/
\h**p://www.bestbooks.ru/
\h**p://leoslibrary.on.to/
\h**p://www.bomanuar.ru/
\h**p://molbiol.ru/review/index.html
\h**p://lib.rin.ru/
\h**p://www.bomanuar.ru/
\h**p://www.voronezh.net/library/
\h**p://www.xnt.info/category.php?all=44&start=5&id=9
\h**p://netfoo.net/unix_iso/unixbook.iso
\h**p://maui.fornex.net/e-book/pdf-books/
\h**p://books.dimka.ee/ - HUGE COLLECTION
\h**p://cgdn.net/books/ - Game Programming
\h**p://www.whitefreespeech.com/sub/TurnerDiaries.pdf
\h**p://www.solargeneral.com/library
\h**p://classics.mit.edu/Browse
\h**p://www.nerd-star.com/books/
\h**p://web.starman.ee/winxp
\h**p://www.comms.engg.susx.ac.uk/fft/
\h**p://www.vdr-era.cjb.net/documentos/
\h**p://devsaa.narod.ru/books
\h**p://www.ibiblio.org/obp/electricCircuits
\h**p://www.highend3d.com/artists/
\h**p://onlinebooks.library.upenn.edu/
\h**p://macbeht.narod.ru/bucher.htm
\h**p://www.pcworld.com/resource/PDF/circ_2.asp
\h**p://netfoo.net/unix_iso/unixbook.iso
\h**p://maui.fornex.net/e-book/pdf-books/
\h**p://books.dimka.ee/
\h**p://www.click-now.net/ebooks.htm
\h**p://www.baen.com/
\h**p://www.ebookmall.com/ebook/5613-ebook.htm
\h**p://etext.library.adelaide.edu.au/
\h**p://www.freebooks4doctors.com
\h**p://gutenberg.net/cgi-bin/search/t9.cgi
\h**p://gutenberg.net/gutenberg/find.shtml
\h**p://freetechstuff.netfirms.com/dotnet/books.htm
\h**p://www.strath.ac.uk/IT/Docs/Ccourse/
\h**p://www.brpreiss.com/books/opus4/html/book.html
\h**p://onlinebooks.library.upenn.edu/
\h**p://www.xatrix.org/index.php
\h**p://www.commandprompt.com/ppbook/
\h**p://www.vijaymukhi.com/documents/books/
\h**p://docs.rinet.ru/Cold/
\h**p://www.syncfusion.com/FAQ/WinForms/default.asp#86
\h**p://www.blindprogramming.com/
\h**p://ssuet.edu.pk/taimoor/books/1-57521-163-7/index.htm
\h**p://www.manastungare.com
\h**p://world.std.com/obi/
\h**p://www.itebooks.net/onlineebooks/Programming.html
\h**p://freebooks.boom.ru
\h**p://the-tech.mit.edu/Shakespeare/
\h**p://www.vecpix.com/
\h**p://kristi.erdves.lt/books/
\h**p://www.zionwap.net/books/main.html
\h**p://www.nopayweb.com/computerbook/
\h**p://leon83.com/download/book/FreeBookList.htm
\h**p://www.mslit.com
\h**p://www.python.org/doc/current/tut/tut.html
\h**p://esspc-ebooks.com
\h**p://www.xnt.info/category.php?id=9
\h**p://www.bluesfear.com/v5.php
\h**p://www.teamphotoshop.com/photoshop/tutorials/ps_tut.php
\h**p://www.80four.co.uk/tutorials/photoshop.html
\h**p://www.eyesondesign.net/pshop/tuts.htm
\h**p://www.good-tutorials.com/
\h**p://www.grafx-design.com/tutorials.html
\h**p://myjanee.home.insightbb.com/tutorials.htm
\h**p://rainworld.com/psworkshop/
Stumble Upon Toolbar Read more on this article... Read more on this article...

10 reasons why PCs crashes U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
Stumble Upon Toolbar Read more on this article... Read more on this article...

May 30, 2009

How to earn 50$ a day.You can slap me if it doesnt work

Go to www.paypal.com and sign up for a "premier paypal account".
If it asks for your bank or credit card, just cancel (yes, premier account is 100% free also)
You may have heard of the popular PTC site, NeoBux, that pays you to click ads.

This Strategy Guide will teach you how to make REAL money with them, without paying them a thing.

The only catch is you won't be making $50/day right off the bat.
You will be making a few cents when you first start. The name of the game is called PATIENCE. Now, with this method, I won't be investing any money to earn money. If you have money to invest, by all means, do it and you'll see results faster than mine.

The key to making money on NeoBux is through referrals. It's simple, if you don't have referrals, you won't make money. You can rent referrals directly from NeoBux.
The referrals are real people (NOT BOTS) and cost 30 cents a month each. Some will be active and some won't.
To "recycle" a non-active referral for an active one you have to pay 8 cents.
It may seem like a lot, but it's worth it. If you don't recycle inactive referrals, you will lose money.

Okay enough chat let’s begin!

Sign Up To NeoBux Here: NeoBux: The innovation in PTC

Step 1:
Start Clicking Your Ads Every day, When you reach 75 cents by clicking on your own ads (if you don't invest money) you are able purchase 3 referrals (DO NOT BY REFFS YET!), it takes a few days to earn the 75 cents on your own and people are so eager to buy referrals that they just purchase as soon as their account reaches 75 cents.
When people do this they do not realize that they do not have enough money to maintain their rented referrals and their referrals eventually are taken away because they can't pay for them.

Step 2:
Ok so before you rent referrals you should earn $3 by clicking on your ads (Or You Can Invest For Quickness) and then transfer it to your rental balance. This way you have $1 per referral and you will easily be able to recycle them if they are not active or pay to keep them for one more month. It will take a while to get $3 on your own, but this way you will be able to keep your referrals and exchange the inactive ones for active ones without the fear that you will not be able to pay for them.

Step 3:
Once you have your $3 in your rental balance purchase 3 referrals, Autopay is another must. As soon as you rent your first 3 referrals turn Autopay on (you will find this on the page where your referrals are listed). Referrals cost 30 cents a month to keep. Instead of you paying for the referral, they pay for themselves as long as you have Autopay turned on. What it does it subtract one of the advertisements your referral views each day and puts it towards the 30 cents that referral needs to stick around for another month. So you get one less penny from each referral, but they will be your referral as long as they are active.

Step 4:
Cashing out too early is a huge problem for people that use NeoBux.
When you request a payment it is INSTANTLY transferred into your Alertpay/Paypal account.
In order to see if NeoBux is indeed legit (which it is) many people will earn a dollar by clicking and then cash it out. Woo-hoo. You now have a WHOLE DOLLAR in your Paypal account.
That dollar should have been put towards buying referrals. With this strategy you will be putting $3 into your rental balance before you buy 3 referrals. So $1 per referral. I actually did not cash out until I started reaching +1000 refs.
Keep renting referrals by increments of 3 (you can rent by higher increments later as your referrals make you more money) and continue until you have 500 referrals. This will take quite some time. This is where most people flake out. When you reach 500 referrals, stop buying referrals and just maintain the ones you already have. Keep doing this until the money builds up to about $100 and you can use $90 of it to pay for golden. $100 won't take very long at all to get once you have 500 referrals and once you upgrade to golden your earnings will DOUBLE. This is the great part. Golden costs $90 a year but instead of getting half a cent for every advertisement your referral views, you get 1 cent. Your earnings double. That's all there is to it.

Keep renting new referrals after you upgrade to golden and don't cash out. Remember, you haven't cashed out at all, and you shouldn't until you have 2000 referals. But when you do cash out, you will be able to cash out about $50 a day. And that's the end of the strategy.

P.S. It will also help you in your neobux adventure to get direct referrals, with the use of a referral link, such as the one below. Please sign up under me. You don't have to, but I would appreciate it, in exchange for the info.
Hope this helps guys

Sign Up To NeoBux Here: NeoBux: The innovation in PTC

please sign up to Neobux by clicking this link::http://www.neobux.com/?r=blitzroxz


Stumble Upon Toolbar Read more on this article... Read more on this article...

Apr 7, 2009

Cheap kindle 2




Being in the loop within the reading and book industries we sometimes get the chance to review some
hot products.Today I am sharing my thoughts on one of those products, the Amazon Kindle 2.0.


For those who are unfamiliar with the Kindel, it’s an electronic Book reader that allows you to read your latest novel, magazine, newspaper, or blog on one device and it is cheap.
It has the look of paper with an e-Ink screen, and it’s about the size of a paperback novel.
The Kindle 2 is the second version of this device, and it has some excellent improvements that make
this one worth adding to you “order it now” list.

If you had the chance to use the first Kindle, then there are a few things you’ll notice when
you pick up the new Amazon Kindle 2. First the new device is slimmer and lighter than its predecessor.
In fact, the new version weighs in at just 10.2 ounces, and at only 1/3 of inch thick it is much thinner than the old Kindle.The next thing you’ll notice when you pick up the Amazon Kindle 2.0 is the improved keyboard, and strategically located page turning buttons. Customers of the old Kindle complained about how easy it was to accidently flip the pages. That problem is gone with Amazons follow up device.

Where this one really shines though, is when you get into the actual features that Amazon has put into
the new Kindle 2.0. Features like:

* 3G Wireless access lets you buy and download books anywhere, anytime, and without having to search
for a Wi-Fi host-spot, and with no wireless access fees.
* Over 7,000 titles which you can download for free on Amazon.
* An improved display that looks even more like real paper, and provides crisper images.
* An improved battery life that will keep you reading for days on just a single charge.
* More storage that allows you to take more than 1500 books with you wherever you go.
* Improved page turning speeds. This takes care of the other common complaint with the first version of the Kindle.

You would think that with all of those additions that Amazon would have stopped there.
Really they could have, and it still would have been a large enough improvement to lead many to
upgrade to this new version. They didn’t stop their though, they also added read-to-me.

The new read-to-me is a text-to-speech system that will let you listen to your Kindle 2
at the push of a button. If you’re on the road and you still want to get the latest news,
catch up on your blog reading, or finish that novel, the Kindle 2 will read it to you while you’re on
the go.

For more specifications click here
Stumble Upon Toolbar Read more on this article... Read more on this article...

Mar 5, 2009

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to track spam, ACME Software
Inc notice that there was not as much traffic as they hoped to receive. During further
investigation, they found that they could not view their own website. At that moment, the
VP of sales received a call from the company's broker stating that ACME Software Inc
stock fell 4 point due to lack of confidence. Several states away, spammers didn't like the
idea of lower profit margins do to an easy to install spam blocking software so they
thought they would fight back. Earlier that day, they took control of hundreds of
compromised computers and used them as DoS zombies to attack ACME Software Inc's
Internet servers in a vicious act of cyber assault. During an emergency press conference
the next morning, ACME Software Inc's CIO announced his resignation as a result of a
several million dollar corporate loss.
Scenarios like the one above happen a more then people think and are more costly
then most will admit. Denial of Service (DoS) attacks are designed to deplete the
resources of a target computer system in an attempt to take a node off line by crashing or
overloading it. Distributed Denial of Service (DDoS) is a DoS attack that is engaged by
many different locations. The most common DDoS attacks are instigated through viruses
or zombie machines. There are many reasons that DoS attacks are executed, and most of
them are out of malicious intent. DoS attacks are almost impossible to prevent if you are
singled out as a target. It's difficult to distinguish the difference between a legitimate
packet and one used for a DoS attack.
The purpose of this article is to give the reader with basic network knowledge a
better understanding of the challenges presented by Denial of Service attacks, how they
work, and ways to protect systems and networks from them.

Instigation:
Spoofing - Falsifying an Internet address (know as spoofing) is the method an attacker
uses to fake an IP address. This is used to reroute traffic to a target network node or used
to deceive a server into identifying the attacker as a legitimate node. When most of us
think of this approach of hacking, we think of someone in another city essentially
becoming you. The way TCP/IP is designed, the only way a criminal hacker or cracker
can take over your Internet identity in this fashion is to blind spoof. This means that the
impostor knows exactly what responses to send to a port, but will not get the
corresponding response since the traffic is routed to the original system. If the spoofing is
designed around a DoS attack, the internal address becomes the victim. Spoofing is used
in most of the well-known DoS attacks. Many attackers will start a DoS attack to drop a
node from the network so they can take over the IP address of that device. IP Hijacking is
the main method used when attacking a secured network or attempting other attacks like
the Man in the Middle attack.
SYN Flood - Attackers send a series of SYN requests to a target (victim). The target
sends a SYN ACK in response and waits for an ACK to come back to complete the
session set up. Instead of responding with an ACK, the attacker responds with another
SYN to open up a new connection. This causes the connection queues and memory buffer
to fill up, thereby denying service to legitimate TCP users. At this time, the attacker can
hijack the system's IP address if that is the end goal. Spoofing the "source" IP address
when sending a SYN flood will not only cover the offender's tracks, but is also a method
of attack in itself. SYN Floods are the most commonly used DoS in viruses and are easy
to write. See http://www.infosecprofessionals.com/code/synflood.c.txt
Smurf Attack- Smurf and Fraggle attacks are the easiest to prevent. A perpetrator sends a
large number of ICMP echo (ping) traffic at IP broadcast addresses, using a fake source
address. The "source" or spoofed address will be flooded with simultaneous replies (See
CERT Advisory: CA-1998-01). This can be prevented by simply blocking broadcast
traffic from remote network sources using access control lists.
Fraggle Attack - This types of attack is the same as a Smurf attack except using UDP
instead if TCP. By sending an UDP echo (ping) traffic to IP broadcast addresses, the
systems on the network will all respond to the spoofed address and affect the target
system. This is a simple rewrite of the Smurf code. This can be prevented by simply
blocking broadcast traffic from remote IP address.
Ping of Death - An attacker sends illegitimate ICMP (ping) packets larger than 65,536
bytes to a system with the intention of crashing it. These attacks have been outdated since
the days of NT4 and Win95.
Teardrop - Otherwise known as an IP fragmentation attack, this DoS attack targets
systems that are running Windows NT 4.0, Win95 , Linux up to 2.0.32. Like the Ping of
Death, the Teardrop is no longer effective.
Application Attack - Thess are DoS attacks that involve exploiting an application
vulnerability causing the target program to crash or restart the system.
Kazaa and Morpheus have a known flaw that will allow an attacker to consume all
available bandwidth without being logged.
See http://www.infosecprofessionals.com/code/kazaa.pl.txt

Microsoft's IIS 5 SSL also has an easy way to exploit vulnerability. Most exploits like
these are easy to find on the Internet and can be copied and pasted as working code.
There are thousands of exploits that can be used to DoS a target system/application. See
http://www.infosecprofessionals.com/code/IIS5SSL.c.txt

Viruses, Worms, and Antivirus - Yes, Antivirus. Too many cases where the antivirus
configuration is wrong or the wrong edition is installed. This lack of foresight causes an
unintentional DDoS attack on the network by taking up valuable CPU resources and
bandwidth. Viruses and worms also cause DDoS attacks by the nature of how they
spread. Some purposefully attack an individual target after a system has been infected.
The Blaster worm that exploits the DCOM RPC vulnerability (described in Microsoft
Security Bulletin MS03-026) using TCP port 135 is a great example of this. The Blaster
targeted Microsoft's windows update site by initiating a SYN FLOOD. Because of this,
Microsoft decided to no longer resolve the DNS for 'windowsupdate.com'.

DoS attacks are impossible to stop. However, there are things you can do to
mitigate potential damages they may cause to your environment. The main thing to
remember is that you always need to keep up-to-date on the newest threats.

Mitigation:
Antivirus software - Installing an antivirus software with the latest virus definitions will
help prevent your system from becoming a DoS zombie. Now, more then ever, this is an
important feature that you must have. With lawsuits so prevalent, not having the proper
protection can leave you open for downstream liability.
Software updates - Keep your software up to date at all times. This includes antivirus,
email clients, and network servers. You also need to keep all network Operating Systems
installed with the latest security patches. Microsoft has done a great job with making
these patches available for their Windows distributions. Linux has been said to be more
secure, but the patches are far more scarce. RedHat is planning on incorporating the
NSA's SE Linux kernel into future releases. This will give Mandatory Access Control
(MAC) capabilities to the Linux community.
Network protection - Using a combination of firewalls and Intrusion Detection Systems
(IDS) can cut down on suspicious traffic and can make the difference between logged
annoyance and your job. Firewalls should be set to deny all traffic that is not specifically
designed to pass through. Integrating an IDS will warn you when strange traffic is present
on your network. This will assist you in finding and stopping attacks.
Network device configuration - Configuring perimeter devices like routers can detect
and in some cases prevent DoS attacks. Cisco routers can be configured to actively
prevent SYN attacks starting in Cisco IOS 11.3 and higher using the TCP intercept
command in global configuration mode.
Access-list number {deny | permit} tcp any destination destination-wildcard
ip tcp intercept list access-list-number
ip tcp intercept ? (will give you a good list of other options.)
Cisco routers can prevent Smurf and Fraggle attacks by blocking broadcast traffic. Since
Cisco IOS 12.0, this is the default configuration. ACLs or access control lists should also
be configured on all interfaces.
No ip directed-broadcast
The Cisco router can also be used to prevent IP spoofing.
ip access-group list in interface
access-list number deny icmp any any redirect
access-list number deny ip 127.0.0.0 0.255.255.255 any
access-list number deny ip 224.0.0.0 31.255.255.255 any
access-list number deny ip host 0.0.0.0 any
See Improving Security on Cisco Routers - www.cisco.com/warp/public/707/21.html
Old Cisco IOS versions are vulnerable to several DoS attacks. The "Black Angels" wrote
a program called Cisco Global Exploiter. This is a great software to use when testing the
security of your Cisco router version and configuration and can be found at
http://www.blackangels.it/Projects/cge.htm

Security is not as mystical as people believe. DoS attacks come in many different
types and can be devastating if you don't take the proper precautions. Keep up to date and
take steps to secure network nodes. Keeping security in mind can minimize damages,
downtime, and save your career.
Stumble Upon Toolbar Read more on this article... Read more on this article...
::SITES LINKING ME::

SetEnvIfNoCase Referer "^http://(www.)?securecomputing\.com" ref=1 "(.*)" Order Allow,Deny Allow from all Deny from 206.169.110.66 Deny from env=ref